SuSE: New Firefox packages fix security vulnerability

MozillaFirefox was updated to 10.0.1 to fix a security issue. Mozilla developers Andrew McCreight and Olli Pettay found that ReadPrototypeBindings will leave a XBL binding in a hash table even when the function fails. If this occurs, when the cycle collector reads this hash table and attempts to do a virtual method on this binding a crash will occur. Updated packages are available from download.opensuse.org.

openSUSE Security Update: MozillaFirefox to 10.0.1
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0258-1
Rating: critical
References: #746616
Cross-References: CVE-2012-0452
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes two new package versions.
Description:
MozillaFirefox was updated to 10.0.1 to fix critical bugs
and security issue.
Following security issue was fixed: CVE-2012-0452: Mozilla
developers Andrew McCreight and Olli Pettay found that
ReadPrototypeBindings will leave a XBL binding in a hash
table even when the function fails. If this occurs, when
the cycle collector reads this hash table and attempts to
do a virtual method on this binding a crash will occur.
This crash may be potentially exploitable.
Firefox 9 and earlier are not affected by this
vulnerability.
https://www.mozilla.org/security/announce/2012/mfsa2012-10.h
tml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch MozillaFirefox-5799 seamonkey-5804
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 10.0.1 and 2.7.1]:
MozillaFirefox-10.0.1-0.2.1
MozillaFirefox-branding-upstream-10.0.1-0.2.1
MozillaFirefox-buildsymbols-10.0.1-0.2.1
MozillaFirefox-devel-10.0.1-0.2.1
MozillaFirefox-translations-common-10.0.1-0.2.1
MozillaFirefox-translations-other-10.0.1-0.2.1
seamonkey-2.7.1-0.2.1
seamonkey-dom-inspector-2.7.1-0.2.1
seamonkey-irc-2.7.1-0.2.1
seamonkey-translations-common-2.7.1-0.2.1
seamonkey-translations-other-2.7.1-0.2.1
seamonkey-venkman-2.7.1-0.2.1
References:
http://support.novell.com/security/cve/CVE-2012-0452.html
https://bugzilla.novell.com/746616